y11en / babysc
自用的shellcode生成框架
☆31Updated last year
Alternatives and similar repositories for babysc:
Users that are interested in babysc are comparing it to the libraries listed below
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- 域前置版本FRP☆15Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- desktop screenshot☆29Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- ☆40Updated last year
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 2 years ago
- ☆19Updated 2 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆11Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- 内存分析中玩贪吃蛇☆15Updated last year
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- CVE-2020-1472 C++☆81Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆42Updated 10 months ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆61Updated 9 months ago
- ☆11Updated 2 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆18Updated 2 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 3 years ago
- 过360拦截加载无驱动签名☆60Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- SysWhispers3WinHttp 基于SysWhispers3项目增添WinHttp分离加载功能并使用32位GCC进行编译,文件大小14KB,可免杀绕过360核晶防护与Defender☆31Updated 2 years ago
- A packer which adds encrypted shell to protect your PE file☆19Updated 4 months ago
- Call the CLR interface from memory to load powershell, process-less powershell☆12Updated last year
- 一个demo☆23Updated 11 months ago
- 重构Beacon☆15Updated 7 months ago
- ☆91Updated 3 years ago